Article 11
|
(Protection of Information of Computer Audit Records (Logs))
- For management purposes, access to computer audit records (logs) is limited to authorized users only.
- A core system shall apply hashing or other appropriate comprehensive mechanism of protection. A comprehensive mechanism of protection is advised for a non-core system
- A core system of a type 1 organization shall make a regular backup of computer audit records (logs) in other external physical systems.
|